咨询与建议

限定检索结果

文献类型

  • 598 篇 会议
  • 558 篇 期刊文献
  • 3 册 图书

馆藏范围

  • 1,159 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 734 篇 工学
    • 578 篇 计算机科学与技术...
    • 471 篇 软件工程
    • 158 篇 信息与通信工程
    • 75 篇 生物工程
    • 72 篇 控制科学与工程
    • 67 篇 电气工程
    • 43 篇 化学工程与技术
    • 41 篇 机械工程
    • 41 篇 电子科学与技术(可...
    • 34 篇 生物医学工程(可授...
    • 25 篇 仪器科学与技术
    • 25 篇 动力工程及工程热...
    • 21 篇 光学工程
    • 21 篇 材料科学与工程(可...
    • 20 篇 交通运输工程
    • 19 篇 建筑学
    • 18 篇 航空宇航科学与技...
  • 338 篇 理学
    • 187 篇 数学
    • 84 篇 生物学
    • 72 篇 物理学
    • 58 篇 统计学(可授理学、...
    • 40 篇 化学
    • 21 篇 系统科学
  • 298 篇 管理学
    • 181 篇 图书情报与档案管...
    • 148 篇 管理科学与工程(可...
    • 45 篇 工商管理
  • 40 篇 法学
    • 35 篇 社会学
  • 39 篇 医学
    • 32 篇 临床医学
    • 25 篇 基础医学(可授医学...
  • 18 篇 经济学
    • 18 篇 应用经济学
  • 10 篇 教育学
  • 7 篇 文学
  • 6 篇 农学
  • 1 篇 军事学
  • 1 篇 艺术学

主题

  • 59 篇 semantics
  • 35 篇 knowledge engine...
  • 35 篇 data mining
  • 31 篇 training
  • 26 篇 feature extracti...
  • 21 篇 data models
  • 20 篇 data engineering
  • 20 篇 laboratories
  • 20 篇 computational mo...
  • 20 篇 machine learning
  • 19 篇 conferences
  • 19 篇 xml
  • 19 篇 big data
  • 19 篇 information retr...
  • 17 篇 task analysis
  • 17 篇 visualization
  • 16 篇 deep learning
  • 16 篇 knowledge graph
  • 16 篇 databases
  • 15 篇 knowledge manage...

机构

  • 167 篇 school of inform...
  • 104 篇 school of comput...
  • 54 篇 key laboratory o...
  • 49 篇 key laboratory o...
  • 42 篇 college of compu...
  • 32 篇 jiangxi key labo...
  • 32 篇 school of inform...
  • 31 篇 key laboratory o...
  • 29 篇 key laboratory o...
  • 26 篇 key laboratory o...
  • 25 篇 key laboratory o...
  • 23 篇 key laboratory o...
  • 20 篇 key laboratory o...
  • 19 篇 school of inform...
  • 18 篇 key laboratory o...
  • 18 篇 school of econom...
  • 18 篇 key laboratory o...
  • 18 篇 key laboratory o...
  • 16 篇 school of cyber ...
  • 15 篇 school of comput...

作者

  • 54 篇 chen hong
  • 44 篇 du xiaoyong
  • 37 篇 wu xindong
  • 35 篇 li cuiping
  • 32 篇 hong chen
  • 32 篇 wang meng
  • 30 篇 xiaoyong du
  • 29 篇 wang shan
  • 28 篇 xindong wu
  • 28 篇 zhang jing
  • 24 篇 sun geng
  • 21 篇 niyato dusit
  • 19 篇 liu jun
  • 18 篇 meng wang
  • 18 篇 huang qingming
  • 18 篇 hong richang
  • 17 篇 shan wang
  • 17 篇 wang yang
  • 17 篇 li jiahui
  • 17 篇 wang jiacheng

语言

  • 1,070 篇 英文
  • 58 篇 其他
  • 31 篇 中文
检索条件"机构=Key Laboratory of Data Engineering and Knowledge Engineering of MOE"
1159 条 记 录,以下是741-750 订阅
排序:
Combining term semantics with content and structure semantics for XML element search results clustering
收藏 引用
Journal of Convergence Information Technology 2012年 第15期7卷 26-35页
作者: Minjuan, Zhong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
The biggest characteristic of the XML retrieval is able to return the element node results. This paper studies XML element search results clustering and proposes one similarity measurement method based on term semanti... 详细信息
来源: 评论
Formal Analysis of Trusted Computing: One Case Study
Formal Analysis of Trusted Computing: One Case Study
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
LS 2 is the logic to reason about the property of trusted computing. However, it lacks the capability of modeling the isolation provided by virtualization which is often involved in previous trusted computing system.... 详细信息
来源: 评论
Pseudo-relevance feedback driven for XML query expansion
收藏 引用
Journal of Convergence Information Technology 2010年 第9期5卷 146-156页
作者: Minjuan, Zhong Changxuan, Wan School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
Pseudo-relevance feedback has been perceived as an effective solution for automatic query expansion. However, a recent study has shown that traditional pseudo-relevance feedback may bring into topic drift and hence be... 详细信息
来源: 评论
Configurable ranking for XML vague retrieval
收藏 引用
Journal of Computational Information Systems 2009年 第2期5卷 683-692页
作者: Jiang, Tengjiao Wan, Changxuan Liu, Xiping School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
Ranking is one of the key factors for efficient and effective XML information retrieval. Compared with traditional IR, XML information retrieval has introduced many new challenges, one of which is that the traditional... 详细信息
来源: 评论
Clustering XML retrieval results based on hybrid similarity
收藏 引用
Journal of Computational Information Systems 2008年 第3期4卷 1323-1330页
作者: Wan, Changxuan Yu, Hong School of Information Technology Jiangxi University of Finance and Economics Nanchang 330013 China Jiangxi Key Laboratory of Data and Knowledge Engineering Jiangxi University of Finance and Economics Nanchang 330013 China
With the unceasing growth of XML data in World Wide Web, XML document retrieval and clustering retrieval results are confronted with both challenges and opportunities. One of the challenges is how to improve the quali... 详细信息
来源: 评论
B-IRP: An Improving Integrity Report Protocol for Remote Attestation
B-IRP: An Improving Integrity Report Protocol for Remote Att...
收藏 引用
WRI International Conference on Communications and Mobile Computing, CMC
作者: HongWei Zhou JinHui Yuan Key Laboratory of Data Engineering and Knowledge Engineering Ministry of Education Beijing China School of Information Renmin University of China Beijing China Institute of Electronic Technology Zhengzhou Information Engineering University of China Zhengzhou China
Trusted platform module (TPM) has little computation capability, and it is the performance bottleneck of remote attestation. In the scenario where the server is the attestation-busy entity which answers attestation re... 详细信息
来源: 评论
Iterative context-aware graph inference for visual dialog
arXiv
收藏 引用
arXiv 2020年
作者: Guo, Dan Wang, Hui Zhang, Hanwang Zha, Zheng-Jun Wang, Meng Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology School of Computer Science and Information Engineering Hefei University of Technology Nanyang Technological University University of Science and Technology of China
Visual dialog is a challenging task that requires the comprehension of the semantic dependencies among implicit visual and textual contexts. This task can refer to the relation inference in a graphical model with spar... 详细信息
来源: 评论
Smart Contract Vulnerability Detection Based on Semantic Graph and Residual Graph Convolutional Networks with Edge Attention
SSRN
收藏 引用
SSRN 2022年
作者: Chen, Da Feng, Lin Fan, Yuqi Shang, Siyuan Wei, Zhenchun The Key Laboratory of Knowledge Engineering with Big Data Hefei University of Technology Ministry of Education China School of Computer Science and Information Engineering Hefei University of Technology Anhui Hefei230009 China
It is imperative to assure the security of smart contracts via intelligent vulnerability detection tools before deploying smart contracts on blockchains. The existing deep learning-based approaches fail to effectively... 详细信息
来源: 评论
DRAG: Dynamic Region-Aware GCN for Privacy-Leaking Image Detection
arXiv
收藏 引用
arXiv 2022年
作者: Yang, Guang Cao, Juan Sheng, Qiang Qi, Peng Li, Xirong Li, Jintao Key Laboratory of Intelligent Information Processing Institute of Computing Technology Chinese Academy of Sciences China University of Chinese Academy of Sciences China Key Lab of Data Engineering and Knowledge Engineering Renmin University of China China
The daily practice of sharing images on social media raises a severe issue about privacy leakage. To address the issue, privacy-leaking image detection is studied recently, with the goal to automatically identify imag... 详细信息
来源: 评论
Deep Semantic-Enhanced Event Detection via Symmetric Graph Convolutional Network
Deep Semantic-Enhanced Event Detection via Symmetric Graph C...
收藏 引用
IEEE International Conference on Big knowledge (ICBK)
作者: Chenchen Sun Xingrui Zhuo Zhenya Lu Chenyang Bu Gongqing Wu Key Laboratory of Knowledge Engineering with Big Data (the Ministry of Education of China) Hefei University of Technology Hefei China School of Computer Science and Information Engineering Hefei University of Technology Hefei China
Event detection, an important research topic of information extraction, aims to automatically identify and classify event instances from the text. Previous studies have introduced methods combining syntactic informati... 详细信息
来源: 评论